Introduction
Companies and infrastructure within the naval and maritime sectors are under attack. In recent years, security experts have observed a growing number of attacks carried out by different types of attackers, including cybercrime syndicates and nation-state actors.
On the morning of September 20th, 2018, the Port of Barcelona was hit by a cyber-attack that forced the operators of the port’s infrastructure to launch emergency procedures. A few days later, several computers at the Port of San Diego were infected with ransomware. The incident impacted the processing of park permits and record requests, as well as other operations.
The incidents have raised discussion about security for these types of critical infrastructures and demonstrated that ports and other such locations are too vulnerable to cyber-attacks. The increased usage of computer systems for navigation, container inspection, design and manufacturing of vessels is exposing the industry to cyber-threats.
The design center, ships and safe navigation, satellite communications systems, tracking systems, marine radar systems and automatic identification systems are just a few examples of potential targets for attackers.
According to experts, the rapid and increasing convergence of IT and OT systems, along with the diffusion of connected devices, is exposing the navy and shipping to cyber-threats. Threat actors could launch cyber-attacks for the purpose of either espionage or sabotage. To mitigate threats, it is necessary to adopt a new model of cybersecurity based on threat intelligence and information sharing on cyber-threats.
The maritime sector is particularly threatened by disruptions due to the role of technology in global trade.
Many cyber-attacks have been carried out on commercial ships. In one such incident, a commercial ship contracted to the U.S. military was the victim of a cyber-attack powered by suspected Chinese military hackers. In 2012, the China-linked hackers compromised “multiple systems” on a commercial ship (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Pierluigi Paganini. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/_KnbgyIJVcA/

